Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Common Cryptography Terms

20

Flashcards

0/20

Still learning
StarStarStarStar

Asymmetric Encryption

StarStarStarStar

A cryptographic system that uses pairs of keys: one public key that may be disseminated widely, and one private key that is known only to the owner. Examples: RSA, ECC (Elliptic Curve Cryptography)

StarStarStarStar

Ciphertext

StarStarStarStar

Data that has been encrypted. It is not meant to be easily understood as it has been transformed into a coded form. Examples: Encrypted messages, Encrypted files

StarStarStarStar

Salt

StarStarStarStar

Random data that is used as an additional input to a one-way function that hashes data, a password, or passphrase. It is used to safeguard passwords in storage. Examples: Hashing user passwords for storage, Creating unique hashes from identical input

StarStarStarStar

Kerckhoffs's Principle

StarStarStarStar

A concept in the field of cryptography that states that a cryptographic system should remain secure even if everything about the system, except the key, is public knowledge. Examples: AES protocol transparency, Security of public key systems

StarStarStarStar

Hash Function

StarStarStarStar

A function that converts an input (or 'message') into a fixed-size string of bytes, typically for the purpose of making the output unique. Examples: SHA-256, MD5

StarStarStarStar

Steganography

StarStarStarStar

The practice of concealing messages or information within other non-secret text or data. It focuses on hiding the existence of the message. Examples: Hiding a message within an image or audio file, Invisible ink

StarStarStarStar

Block Cipher

StarStarStarStar

A cipher that divides the input data into blocks of a specific size and then encrypts or decrypts data one block at a time. Examples: AES, DES

StarStarStarStar

Key Exchange

StarStarStarStar

A method by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. Examples: Diffie-Hellman, ECDH (Elliptic Curve Diffie-Hellman)

StarStarStarStar

Stream Cipher

StarStarStarStar

A cipher that encrypts plaintext digital data one bit or byte at a time. Examples: RC4, Salsa20

StarStarStarStar

Cryptography

StarStarStarStar

The practice and study of techniques for secure communication in the presence of adversaries. It includes various areas such as encryption, decryption, and steganography. Examples: Encoding classified information, Secure online transactions

StarStarStarStar

Cryptanalysis

StarStarStarStar

The study of analyzing information systems in order to understand hidden aspects of the systems. It is used to breach cryptographic security systems and gain access to the contents of encrypted messages. Examples: Codebreaking, Side-channel attacks

StarStarStarStar

Nonce

StarStarStarStar

An arbitrary number that can be used just once in a cryptographic communication. It is often a random or pseudo-random number issued in an authentication protocol to ensure that old communications cannot be reused. Examples: Initialization vector in encryption, Challenge in authentication protocols

StarStarStarStar

Elliptic Curve Cryptography (ECC)

StarStarStarStar

A type of public key cryptography based on the algebraic structure of elliptic curves over finite fields. Examples: Secp256k1 used in Bitcoin, ECDH for key exchange

StarStarStarStar

Cipher

StarStarStarStar

An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. Examples: AES, Blowfish

StarStarStarStar

Digital Signature

StarStarStarStar

A mathematical scheme for demonstrating the authenticity of digital messages or documents. It is the digital equivalent of a handwritten signature or stamped seal but is much more secure. Examples: RSA-based signatures, ECDSA (Elliptic Curve Digital Signature Algorithm)

StarStarStarStar

Public Key Infrastructure (PKI)

StarStarStarStar

A set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store & revoke digital certificates and manage public-key encryption. Examples: X.509 certificates, SSL/TLS

StarStarStarStar

Certificate Authority (CA)

StarStarStarStar

An entity that issues digital certificates for use by other parties. It is a trusted third-party to the transaction participants. Examples: VeriSign, Let's Encrypt

StarStarStarStar

Symmetric Encryption

StarStarStarStar

A type of encryption where the same key is used for both encrypting and decrypting messages. Examples: AES (Advanced Encryption Standard), DES (Data Encryption Standard)

StarStarStarStar

Side-channel Attack

StarStarStarStar

An attack based on information gained from the physical implementation of a computer system, rather than weaknesses in the implemented algorithms themselves. Examples: Measuring timing to infer data, Analyzing power consumption, Electromagnetic leaks

StarStarStarStar

Plaintext

StarStarStarStar

Information that can be easily understood by anyone, whether it is in a form suitable for direct input to a cipher. Examples: A standard text message, Any readable data before encryption

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.